|
椭圆曲线上代理盲签名方案的改进
|
Abstract:
通过对Tan等人提出的基于椭圆曲线上的离散对数问题(ECDLP)的代理盲签名方案分析,指出该方案具有不安全性,不能抵抗四种常见的伪造攻击:原始签名者和签名接收者的伪造、一般性攻击及签名接收者的一般伪造攻击,且不满足不可链接性。为了克服上述不足之处,提出了一种改进的方案,在代理授权阶段引入委托证书改进代理签名私钥,同时去掉签名生成阶段的参数,使得可以抵抗原始签名者和接收者的伪造攻击,其安全性等价于解离散对数难题,同时方案也具有不可链接性。同时在签名阶段引入签名请求者的私钥,代理签名人无法将盲消息的签名和消息签名联系起来,即签名是不可追踪的。
Through the analysis of the proxy blind signature scheme based on the discrete logarithm problem on elliptic curve (ECDLP) proposed by Tan et al., it is pointed out that the scheme is insecure and cannot resist four common forgery attacks: forgery of the original signer and signature receiver, general attack and general forgery attack of the signature receiver, and does not meet the requirements of unlinkability. In order to overcome the above shortcomings, an improved scheme is proposed. In the proxy authorization phase, a delegation certificate is introduced to improve the proxy signature private key, and the parameters in the signature generation phase are removed, so that it can resist the forgery attacks of the original signer and receiver. Its security is equivalent to solving the discrete logarithm problem, and the scheme is also non linkable. At the same time, the private key of the signature requester is introduced in the signature phase, so the proxy signer cannot as-sociate the blind message signature with the message signature, that is, the signature is untraceable.
[1] | Chaum, D. (1983) Blind Signatures for Untraceable Payments. In: Chaum, D., Rivest, R.L. and Sherman, A.T., Eds., Advances in Cryptology Crypto’82, LNCS, Springer, Berlin, 199-203. https://doi.org/10.1007/978-1-4757-0602-4_18 |
[2] | 韩春霞, 王琳杰. 一种ELGamal体制的盲签名方案[J]. 网络安全技术与应用, 2007(12): 88-89. |
[3] | Mambo, M., Usuda, K. and Okamoto, E. (1996) Proxy Signatures: Delega-tion of the Power to Sign Messages. IEICE Transactions on Fundamentals of Electronics, Communications and Com-puter Sciences, E79-A, 1338-1354. |
[4] | 刘为民. 基于RSA的代理签名方案[J]. 网络与信息, 2007(5): 66. |
[5] | 张计光, 王静, 尹德玉. 基于ElGamal体制的代理签名[J]. 高等函授学报(自然科学版), 2009(3): 57-58. |
[6] | 刘翠翠, 辛小龙. 基于RSA和ELGamal的代理签名方案[J]. 西南民族大学学报: 自然科学版, 2011, 37(4): 551-555. |
[7] | Lin, W.D. and Jan, J.K.A. (2000) Security Personal Learning Tools Using a Proxy Blind Signature Scheme. Proceedings of International Conference on Chinese Language Computing, lllinois, 2000, 273-277. |
[8] | 伊丽江, 白国强, 肖国镇. 代理多重签名: 一类新的代理签名方案[J]. 电子学报, 2001, 29(4): 569-570. |
[9] | 贺军, 李丽娟, 李喜梅, 等. 前向安全的代理多重数字签名方案[J]. 计算机工程, 2010, 36(14): 122-123, 126. |
[10] | 祁传达, 陶建平, 金晨辉. 一个安全的多重代理签名方案[J]. 计算机应用研究, 2006, 23(4): 110-111. |
[11] | 杨长海. 基于身份的门限多代理多盲签名方案[J]. 计算机工程与应用, 2010, 46(18): 121-124. |
[12] | 秦艳琳, 吴晓平. 基于ECC的多重代理多重盲签名方案[J]. 计算机工程, 2010, 36(11): 134-136, 139. |
[13] | Tan, Z., Liu, Z. and Tang, C. (2002) Digital Proxy Blind Signature Schemes Based on DLP and EDDLP. MM Research Preprints, 21, 212-217. |
[14] | Lal, S. and Awasthi, A.K. (2003) Proxy Blind Signature Scheme. Transaction on Cryptology, 2, 5-11.
http://eprint.iacr.org |
[15] | Sun, H.M., Hsieh, B.T. and Tseng, S.M. (2005) On the Security of Some Proxy Blind Signa-ture Schemes. Journal of Systems and Software, 74, 297-302. https://doi.org/10.1016/j.jss.2004.02.015 |
[16] | 柳菊霞, 苏靖枫. 基于离散对数的代理盲签名方案[J]. 计算机工程与应用, 2010, 46(25): 94-96. |